Botnets are Spreading Fast–Reveals the Global Botnet Map

We all hate botnets and the worst part is that there is not enough we can do about it. In fact, they are spreading fast, more than ever! And this is quite evident from the Global Botnet Map, recently published by Trend Micro. The map shows active C&C (Command and Control) servers, highlighted by red dots, and bots (victim computers), highlighted by blue dots, to show where these botnets are located in the world.

Trend Micro uses its Global Threat Intelligence to gain insights and develop protection for its customers. As per the Global Botnet Map, 615 C& C servers were active in the last 14 days, while 488,251 active Botnet connections were found. Though this is a massive figure, the positive side is that by knowing exactly where command and control servers are located, Trend Micro can block them. This ensures that their customers are not served malware, or malware does not upload information stolen from their computers to the C&C servers.

Botnets are pretty pathetic in nature as they are pretty unstoppable, and grow abruptly. Not long ago, we saw an innovative fraud scheme from Europe that involved dual infections of PC and smartphones. Reports discovered a sophisticated malware and botnet system known as “Eurograbber” that has been used to steal over $47 million dollars from European victims to date.

“Botnets are the ‘cloud-computing’ of malware strategy,” says HackANGLE editor Kyt Dotson. “Not too long ago, people started to understand distributed global computing power with projects such as Beowulf clusters and the SETI@Home projects; but being able to turn an unsuspecting person’s machine into a general-purpose actor is a real benefit to bad guys. By placing arbitrary code on your machine it can become a zombie for a spam army, a sensor for an illicit network, or even a place to temporarily store illicit information.

“Businesses such as Microsoft have worked long and hard to hunt down, terminate, or neuter botnets. Groups like TrendMicro also lend their expertise to help map the spread of this type of malware and study post-mortem (or in situ) the new strategys that have emerged not just from infection types but command-and-control. We’ve even seen governments tapping into the idea of deploying or using botnets themselves to spy or control potential targets. We can expect botnets to continue to be a big deal in 2013.”

Thanks to Trend Micro, which is always after these sucking botnets. If you use Skype, you would remember the odd message coming from some of your contacts that says, “lol is this your new profile pic?” The explosion of this Trojan through various gaming communities was covered by SiliconANGLE and Trend Micro’s malware labs have identified the malware as a variant of DORKBOT. Trend Micro also noticed that it uses localization based on the geolocation of the system to choose the language of the message.

Premium Research

Wikibon argues strongly against Revolution towards a 3rd platform. The conclusion from this analysis is that applications will evolve; conversion should be avoided like the plague. The greatest opportunity is to continuously adapt today's operational applications by the addition of real-time or near real-time analytics applied directly to the current organizational processes and applications that support these processes. This is likely to translate to the greatest value to most organizations, and where possible avoid the risks of converting systems. The study of organizations that have applied real-time analytics to their current operational systems have shown incredible improvements in lower costs and greater adaptability. Business and IT executives should understand the enormous potential for adding decision automation through real-time analytics to current operational applications in their organizations. New technologies should be judged by their ability to support real-time analytics applied to operational systems, and supporting incremental improvement over time.

In a recent web-based survey conducted by Wikibon, 300 North American enterprises whom had either been utilizing, or considering the adoption of public cloud, answered questions regarding IaaS (Infrastructure as a Service) perceptions and usages. These questions varied in topic but were centered around an examination of which workloads were best suited for usage in the public cloud. This research examines a few additional key insights that shed some light on the growing IaaS world.

Today's Technology infrastructure management is largely non-differentiated and wasteful. Technology executives must re-think the strategic role of human capital and begin to implement new ways to consume IT as a service. This post draws on the learnings of senior executive Alan Nance from Royal Philips who is dogmatic in its approach to transforming its infrastructure to a service model.

There have only been two successful volume introductions into the marketplace in the last 50 years - DRAM and NAND flash. There has to be a clear volume case with good economics for 3D XP to be able to gain a foothold in consumer products. Without volume in the consumer space, there is unlikely to be much volume traction in the enterprise space. CIOs, CTOs and enterprise professionals should take a wait and see stance, and monitor the adoption of 3D XP in the consumer and military spaces. If and when there is volume production for 3D XP, enterprise adoption should start about two years later.

The use of open source software continues to accelerate and expand in the marketplace, especially in areas where technology is significantly disrupting established business models. IT organizations should be actively seeking to understand how open communities operate, how different licensing models work, and how they can be more actively engaged with both the vendors and communities that are shaping open source software.

CIOs understand that a clear cloud strategy is critical for IT today. Wikibon believes the biggest mistake organizations can make is converting major applications into the public cloud (including SaaS) without thinking about the implications to their existing business process workflows. Wikibon recommends that IT develop and implement a hybrid cloud strategy using the existing management workflows and compliance processes for both the public and private cloud components in the hybrid cloud.

In 2014, Wikibon defined a new category "Server SAN" that sits at the intersection of software-defined storage, hyperscale methodologies and converged infrastructure. This article is the executive summary of primary research that gives the status of the market, examines the vendor ecosystem, lays forth the revenue and 10 year forecast and gives direction for expansion beyond simple "hyperconverged infrastructure". This information is available for public consumption, the full research is available to Wikibon clients.

In this research paper, Wikibon looks back at the introductory Server SAN research, adjusts the Server SAN definition to include System Drag, and increases the speed of adoption of Server SAN based on very fast adoption from 2012 to 2014. The overall growth of Server SAN is projected to be about a 23% CAGR from 2014 to 2026, with a faster growth from 2014 to 2020 of 38%. The total Server SAN market is projected to grow to over $48 billion by 2026. The traditional enterprise storage market is projected to decline by -16% CAGR, leading to an overall growth in storage spend of 3% CAGR through 2026. Traditional enterprise storage is being squeezed in a vice between a superior, lower cost and more flexible storage model with Enterprise Server SAN, and the migration of IT towards cloud computing and Hyperscale Server SAN deployments. Wikibon strongly recommends that CTOs & CIOs initiate Server SAN pilot projects in 2015, particularly for applications where either low cost or high performance is required.

If containers are at the center of a shift in how applications are developers and delivered, and their pace of growth and change is unprecedented in IT history, this could have a massive ripple effect on both suppliers and consumers of the ecosystem of IT technologies.